The upsurge in urbanization is depleting natural resources due to the wide usage of aggregates in construction, posing a menace to further progress. If the contemporary state persists, it becomes a threat for further ...
详细信息
In current existences there has been an increase in concentration in the potential of blockchain (BC) technology to transform multiple industries, including cloud security. This study delves into the combination of BC...
详细信息
In current existences there has been an increase in concentration in the potential of blockchain (BC) technology to transform multiple industries, including cloud security. This study delves into the combination of BC technology and cloud security to improve data protection, authentication, and access control. The unchangeable and decentralized nature of BC suggestions a strong foundation for safeguarding cloud-based systems, reducing the vulnerabilities linked to centralized storage and single points of failure. This research investigates the fundamental principles and mechanisms of blockchain-based cloud security, such as encryption, access control, smart contracts, and disseminated mechanism. The employment of BC technology to safeguard data and transactions in cloud-based environments is referred to as blockchain security in cloud computing (CC). To defend the veracity and security of data stored in the cloud, encryption and decentralised consensus processes are *** cloud provides decentralized service and communication all over the world through internet services. By increasing open service accessibility and sharing, the personalized information and sensitive data get unauthorized access leads security breaches, data leakage due to improves security concerns. So the security in the sense, the privacy preservation based security is an important concern to protect the sensitive data from unauthorized access. Most existing security failed in cryptographic approaches doe to key leakages and authenticity failures. To resolve this problem we provide a consensus proof of work based block chain principle (CPoW-BCP) based on provable partitioned encryption is implemented to secure the cloud environment in this research demystifying cryptographic hash function (DCHF) is applied to create portioned data block to make encryption using provable partitioned folding encryption (PPFE). With the support of post quantum chain links (PQCL) the block are stamped with randomiz
Predicting crop disease on the image obtained from the affected crop has been a potential research topic. In this research, the Localise Search Optimisation Algorithm (LSOA) enabled deep Convolutional Neural Network (...
详细信息
Critical thinking skills are increasingly important for comprehending our data-rich society. While museums provide data for discussion, visitors may not naturally question data in such displays due to the inherent aut...
详细信息
Robots are increasingly being deployed in densely populated environments, such as homes, hotels, and office buildings, where they rely on explicit instructions from humans to perform tasks. However, complex tasks ofte...
详细信息
Robots are increasingly being deployed in densely populated environments, such as homes, hotels, and office buildings, where they rely on explicit instructions from humans to perform tasks. However, complex tasks often require multiple instructions and prolonged monitoring, which can be time-consuming and demanding for users. Despite this, there is limited research on enabling robots to autonomously generate tasks based on real-life scenarios. Advanced intelligence necessitates robots to autonomously observe and analyze their environment and then generate tasks autonomously to fulfill human requirements without explicit commands. To address this gap, we propose the autonomous generation of navigation tasks using natural language dialogues. Specifically, a robot autonomously generates tasks by analyzing dialogues involving multiple persons in a real office environment to facilitate the completion of item transportation between various *** propose the leveraging of a large language model(LLM) through chain-of-thought prompting to generate a navigation sequence for a robot from dialogues. We also construct a benchmark dataset consisting of 625 multiperson dialogues using the generation capability of LLMs. Evaluation results and real-world experiments in an office building demonstrate the effectiveness of the proposed method.
This paper deals with sine cosine algorithm to make a balance between exploration and exploitation of the search space and find best convergence rate for global optima, that are used the two trigonometric function sin...
详细信息
Even though every individual is entitled to freedom of speech, some limitations exist when this freedom is used to target and harm another individual or a group of people, as it translates to hate speech. In this stud...
详细信息
In the workplace, risk prevention helps detect the risks and prevent accidents. To achieve this, workers' mental and physical parameters related to their health should be focused on and analyzed. It helps improve ...
详细信息
When the ground communication base stations in the target area are severely destroyed,the deployment of Unmanned Aerial Vehicle(UAV)ad hoc networks can provide people with temporary communication ***,it is necessary t...
详细信息
Video forgery detection has been necessary with recent spurt in fake videos like Deepfakes and doctored videos from multiple video capturing devices. In this paper, we provide a novel technique of detecting fake video...
详细信息
暂无评论